Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
- Lijiao Cheng, Y. Li, W. Li, E. Holm, Qingguo Zhai
- Psychology, Computer Science
- Comput. Secur.
- 1 November 2013
TLDR
KDD CUP-2005 report: facing a great challenge
- Y. Li, Zijian Zheng, H. Dai
- Computer Science
- SKDD
- 1 December 2005
TLDR
High-Accuracy and Fast-Speed MPPT Methods for PV String Under Partially Shaded Conditions
- Yunping Wang, Y. Li, X. Ruan
- Mathematics, Computer Science
- IEEE Transactions on Industrial Electronics
- 2016
TLDR
Optical CDMA via temporal codes
- M. Azizoglu, J. Salehi, Y. Li
- Computer Science
- IEEE Trans. Commun.
- 1 July 1992
TLDR
Construction and Block Error Rate Analysis of Polar Codes Over AWGN Channel Based on Gaussian Approximation
TLDR
Detecting online commercial intention (OCI)
- H. Dai, Lingzhi Zhao, Zaiqing Nie, Ji-Rong Wen, Lee Wang, Y. Li
- Computer Science
- WWW '06
- 23 May 2006
TLDR
DaVinci: dynamically adaptive virtual networks for a customized internet
- Jiayue He, Rui Zhang-Shen, Y. Li, C. Lee, J. Rexford, M. Chiang
- Computer Science
- CoNEXT '08
- 9 December 2008
TLDR
Fundamentals of Heterogeneous Cellular Networks with Energy Harvesting
- Harpreet S. Dhillon, Y. Li, P. Nuggehalli, Zhouyue Pi, J. Andrews
- Computer Science, Mathematics
- IEEE Transactions on Wireless Communications
- 4 July 2013
TLDR
Data-Driven Grasp Synthesis Using Shape Matching and Task-Based Pruning
- Y. Li, Jiaxin L. Fu, N. Pollard
- Computer Science, Medicine
- IEEE Transactions on Visualization and Computer…
- 1 July 2007
TLDR
A Construction of General QAM Golay Complementary Sequences
- Y. Li
- Computer Science
- IEEE Transactions on Information Theory
- 2010
TLDR
...
1
2
3
4
5
...